Static task
static1
Behavioral task
behavioral1
Sample
a182b445ff83d46d593b39f99a791a9a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a182b445ff83d46d593b39f99a791a9a.exe
Resource
win10v2004-20240221-en
General
-
Target
a182b445ff83d46d593b39f99a791a9a
-
Size
180KB
-
MD5
a182b445ff83d46d593b39f99a791a9a
-
SHA1
f23acb3b10148c74bd83687a0ae3c7b09aea5e3b
-
SHA256
5aa8b7713de0a058c491e99f0c09590f26f2f65e9aa85fff8df3fd970e997620
-
SHA512
4caec743fca59ceef8145cbf932d76b0b267ec15f6438cb88abf48d827e0bffac35f43df2a29846dd117960833af8518605f914409095757cee21cc457d92697
-
SSDEEP
3072:bPX6OiTCH5x2gsRcIPhcJxPTJ0yRE+rj:rXPiTGx2gfYmJxPTJ0y2+3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a182b445ff83d46d593b39f99a791a9a
Files
-
a182b445ff83d46d593b39f99a791a9a.exe windows:1 windows x86 arch:x86
9101af28c6e01bc1d709ffcb258f709c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegOpenKeyExA
RegDeleteKeyW
RegCreateKeyExW
RegQueryInfoKeyW
InitializeAcl
AddAccessAllowedAce
OpenProcessToken
InitializeAcl
CloseServiceHandle
RegOpenKeyExW
RegQueryInfoKeyW
SetSecurityDescriptorDacl
RegOpenKeyW
FreeSid
InitializeAcl
AddAccessAllowedAce
RegCreateKeyExW
RegDeleteKeyW
RegCreateKeyExA
RegSetValueExA
RegCreateKeyExA
RegEnumValueW
RegDeleteValueW
RegCreateKeyExA
CloseServiceHandle
RegCreateKeyExA
RegSetValueExA
AdjustTokenPrivileges
RegSetValueExA
user32
GetKeyState
SetWindowTextW
GetClientRect
DispatchMessageA
EndPaint
EndPaint
GetDlgItemTextW
IsIconic
SetFocus
EndDialog
LoadImageW
wsprintfA
RegisterClassW
MessageBeep
RegisterClassExW
kernel32
SetUnhandledExceptionFilter
SetEvent
ExitProcess
GetCurrentProcessId
TerminateProcess
FormatMessageW
WideCharToMultiByte
InitializeCriticalSection
GetSystemTimeAsFileTime
lstrcpyW
Sections
Size: 148KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE